In this article, I am going to detail the way the FakeReprox trojan infused into your computer, and how to get rid of FakeReprox trojan virus.
What is FakeReprox trojan?
Name | FakeReprox |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | Aesevin, Shamoon, Streamto, Ulpm, Zepo, Hoplight |
Fix Tool | See If Your System Has Been Affected by FakeReprox trojan |
Trojan viruses are among the leading malware sorts by its injection rate for quite a long time. And now, during the pandemic, when malware got tremendously active, trojan viruses raised their activity, too. You can see lots of messages on diverse sources, where people are whining about the FakeReprox trojan virus in their computer systems, and also requesting for assisting with FakeReprox trojan virus clearing.
Trojan FakeReprox is a sort of virus that injects into your personal computer, and after that executes various destructive features. These functions depend on a sort of FakeReprox trojan: it can serve as a downloader for other malware or as a launcher for another destructive program which is downloaded together with the FakeReprox trojan virus. Over the last two years, trojans are additionally spread with e-mail add-ons, and most of cases used for phishing or ransomware injection.
FakeReprox2 also known as
Bkav | W32.AIDetectMalware |
MicroWorld-eScan | Trojan.FakeAntivirus.Gen |
FireEye | Generic.mg.ac15732cff33046f |
Skyhigh | BehavesLike.Win32.Generic.cm |
ALYac | Trojan.FakeAntivirus.Gen |
Cylance | unsafe |
VIPRE | Trojan.FakeAntivirus.Gen |
Sangfor | Trojan.Win32.Save.a |
Alibaba | TrojanDownloader:Win32/Katusha.dcce38cb |
CrowdStrike | win/malicious_confidence_100% (W) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Adware.XPAntivirus.AF |
Cynet | Malicious (score: 100) |
APEX | Malicious |
ClamAV | Win.Trojan.Agent-400130 |
Kaspersky | Packed.Win32.Katusha.a |
BitDefender | Trojan.FakeAntivirus.Gen |
NANO-Antivirus | Trojan.Win32.Katusha.bgzkye |
Avast | Win32:FakeAlert-2 |
Tencent | Win32.Packed.Katusha.Pzfl |
TACHYON | Trojan/W32.FakeAntivirus.114688 |
Sophos | Mal/EncPk-FX |
F-Secure | Trojan.TR/Crypt.ZPACK.Gen |
DrWeb | Trojan.DownLoad.15200 |
Zillya | Adware.XPAntivirus.Win32.65 |
Emsisoft | Trojan.FakeAntivirus.Gen (B) |
SentinelOne | Static AI – Suspicious PE |
Jiangmin | Packed.Katusha.dsn |
Webroot | Adware.Rogue.Security.Products |
Varist | W32/Packed.PSJD-0087 |
Avira | TR/Crypt.ZPACK.Gen |
Antiy-AVL | Trojan[Packed]/Win32.Katusha |
Kingsoft | Win32.Troj.Undef.a |
Microsoft | TrojanDownloader:Win32/FakeReprox.B |
Xcitium | TrojWare.Win32.Trojan.Katusha.~A@1qgp20 |
Arcabit | Trojan.FakeAntivirus.Gen |
ZoneAlarm | Packed.Win32.Katusha.a |
GData | Trojan.FakeAntivirus.Gen |
Detected | |
McAfee | FakeAV-CN.gen.i |
MAX | malware (ai score=100) |
VBA32 | BScope.Trojan.Download |
Malwarebytes | MachineLearning/Anomalous.100% |
Panda | Trj/CI.A |
Rising | Malware.Undefined!8.C (TFE:2:FZGsQ4N0XqM) |
Yandex | Trojan.Fraudpack.Gen |
Ikarus | Trojan-Downloader.Win32.FakeAlert |
MaxSecure | Trojan.Malware.15014.susgen |
Fortinet | W32/FakeAlert.A |
BitDefenderTheta | AI:Packer.F084AB051E |
AVG | Win32:FakeAlert-2 |
Cybereason | malicious.d1212b |
DeepInstinct | MALICIOUS |
What are the symptoms of FakeReprox trojan?
- The binary likely contains encrypted or compressed data.;
- Authenticode signature is invalid;
The usual symptom of the FakeReprox trojan virus is a steady appearance of a wide range of malware – adware, browser hijackers, and so on. Because of the activity of these malicious programs, your computer becomes very slow: malware absorbs large quantities of RAM and CPU abilities.
An additional detectable effect of the FakeReprox trojan virus presence is unknown operations showed off in task manager. Often, these processes may try to imitate system processes, but you can understand that they are not legit by taking a look at the source of these tasks. Quasi system applications and FakeReprox trojan’s processes are always detailed as a user’s tasks, not as a system’s.
How to remove FakeReprox trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To delete FakeReprox trojan and also be sure that all extra malware, downloaded with the help of this trojan, will certainly be wiped out, too, I’d suggest you to use Loaris Trojan Remover.
FakeReprox removal guide
To detect and remove all viruses on your PC using Loaris, it’s better to make use of Standard or Full scan. Removable scan, as well as Custom, will scan only specified directories, so such types of scans are not able to provide the full information.
You can observe the detects till the scan process lasts. However, to perform any actions against spotted viruses, you need to wait until the process is finished, or to interrupt the scan.
To designate the specific action for each detected viruses, click the button in front of the detection name of detected malicious programs. By default, all malicious items will be sent to quarantine.
How to remove FakeReprox Trojan?
Name: FakeReprox
Description: Trojan FakeReprox is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of FakeReprox trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the FakeReprox trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan
User Review
( votes)- What is Trojan Horse: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
- FakeReprox VirusTotal Report: https://www.virustotal.com/api/v3/files/0549a62532a517e5f730a9c0e7633c9240b5d724216e3e04ccc3519bdadaf337